Code based fuzzy extractor for biometric keys
Journal Title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА - Year 2018, Vol 3, Issue 11
Abstract
In this paper methods of forming cryptographic keys from biometric images using fuzzy extractors are considered. A new scheme of a fuzzy extractor based on the McEliece cryptosystem is proposed. It is shown that the new design of the fuzzy extractor allows forming cryptographic passwords from biometric images even without the use of non-secret helper string. When using helper string, the proportion of corrected distortions of biometric images increases significantly. In addition, the proposed design relates to a class of post-quantum information security methods, i.e. it is expected to be safely used even for solving cryptanalysis problems with universal quantum computers.
Authors and Affiliations
Alexandr Kuznetsov, Anastasia Kiyan, Roman Serhiienko, Anna Uvarova, Dmytro Prokopovych-Tkachenko
Investigation of geometry of placement of points of pseudo-random codes in Euclidean space
Analysis of the reasons of crisis of error-correcting coding. Grounded prospects for application of pseudorandom codes and developed their mathematical model. Considered comparative probabilistic characteristics of equal...
SYNTHESIS OF DERIVED SIGNAL SYSTEMS FOR APPLICATIONS IN MODERN INFORMATION AND COMMUNICATION SYSTEMS
The specified requirements for complex signal systems selection – data carriers for utilization in information and communication systems (ICT), with higher demand for noise immunity, noise resistance, secrecy and informa...
NTRU Prime IIT Ukraine encryption algorithm with consideration known attacks analysis
The paper deals with the modern cryptographic transformations of the asymmetric end-to-end encryption type, namely – NTRU-like cryptographic systems. A new cryptographic system NTRU Prime IIT Ukraine was created based on...
The research of block ciphers non-injective key schedules properties
The considers non-injective key schedules used in many known block ciphers ("Kalyna", FOX, Twofish, etc.). It is estimated the probability of matching of round keys (formed by non-injective key schedule) set and encrypti...
KEY SCHEDULE OF BLOCK SYMMETRIC CIPHERS
We investigate combinatorial properties of the block symmetric ciphers key schedule in the assumption that the cyclic (round) keys are generated randomly, with equal probability and independently of each other. The model...